Download
working with applications n.
Skip this Video
Loading SlideShow in 5 Seconds..
Working with Applications PowerPoint Presentation
Download Presentation
Working with Applications

Working with Applications

373 Vues Download Presentation
Télécharger la présentation

Working with Applications

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. Working with Applications Lesson 7

  2. Objectives • Administer Internet Explorer • Secure Internet Explorer • Configure Application Compatibility • Configure Application Restrictions

  3. Administering Internet Explorer

  4. Configuring Internet Explorer • Compatibility view • Managing add-ons • Search options • Accelerators • RSS feeds • Printing with IE

  5. Compatibility View

  6. Managing Add-Ons

  7. Configuring Search Options

  8. Configuring Accelerators

  9. Configuring RSS Feeds

  10. Printing with IE

  11. Securing Internet Explorer • Protected Mode • Security Zones • SmartScreen Filter • InPrivate Mode • Pop-Up Blocker • Privacy Settings • Browsing with Certificates

  12. Understanding Protected Mode • Prevents attackers from accessing vital system components • Runs IE with highly reduced privileges • Can only write data to low integrity disk locations, like the Temporary Internet Files folder, and History, Cookies, and Favorites

  13. Configuring Security Zones • Internet • Local intranet • Trusted sites • Restricted sites

  14. Configuring the SmartScreen Filter Warns users of potential phishing Web sites • Online lookup of phishing sites • Online lookup of download sites • Onsite analysis

  15. Using InPrivate Mode Enables you to surf the Internet without leaving any record of your activities • InPrivate Browsing • InPrivate Filtering

  16. Configuring Pop-Up Blocker

  17. Configuring Privacy Settings • Cookie – A file containing information about you or your web-surfing habits • Use privacy settings to limit the ability of Web sites to create cookies

  18. Browsing with Certificates

  19. Configuring application compatibility

  20. Troubleshooting Program Compatibility • Program Compatibility Troubleshooter • Tries to determine why an application is not running properly and gives you two options

  21. Setting Compatibility Modes • Can set compatibility modes manually through the executable’s Properties sheet

  22. Configuring Application Compatibility Policies

  23. Using the Application Compatibility Toolkit • Application Compatibility Manager • Compatibility Administrator • Internet Explorer Compatibility Test tool • Setup Analysis tool • Standard User Analyzer

  24. Application Compatibility Manager

  25. Compatibility Administrator

  26. Internet Explorer Compatibility Test Tool

  27. Setup Analysis Tool • Logging tool to analyze application setup programs for compatibility issues: • Installation of kernel mode drivers • Installation of 16-bit components • Installation of Graphical Identification and Authentication DLLs • Changes to files or registry keys that exist under Windows Resource Protection

  28. Standard User Analyzer

  29. Using Windows XP Mode • Creates a virtual machine running Windows XP on your Windows 7 system • Used for applications that will not run any other way • Free download from Microsoft • Has extensive hardware requirements

  30. Configuring Application Restrictions

  31. Using Software Restriction Policies • Rules that specify which applications users can run

  32. Creating Rules • Certificate rules • Hash rules • Network zone rules • Path rules • Default rule

  33. Configuring Rule Settings • The three possible settings: • Disallow • Basic User • Unrestricted • Most restrictive and secure way is to Disallow all applications and then create Unrestricted rules for the applications you want users to run

  34. Using AppLocker • New feature in Windows 7 Enterprise and Ultimate to create application restrictions more easily • Application Control Policies • Creation of rules is easier - Wizard-based • Only applies to Windows 7 and Windows Server 2008 R2

  35. Understanding Rule Types • Executable rules • Windows Installer rules • Script rules Criteria for resource access: • Publisher • Path • File Hash

  36. Creating Default Rules

  37. Creating Rules Automatically

  38. Creating Rules Manually • Wizard prompts you for the following information: • Action • User or group • Conditions • Exceptions

  39. Skills Summary • Compatibility View, in IE8, enables the browser to display older pages properly. • Add-ons are separate software components that interact with the basic functions of the web browser. • Accelerators enable users to send content to other resources in the form of applications running on the computer or other sites on the Internet. • Protected mode is a way to run Internet Explorer 8 with highly reduced privileges.

  40. Skills Summary (cont.) • A SmartScreen Filter examines traffic for evidence of phishing activity and displays a warning to the user if it finds any. • Security zones have different sets of privileges to provide levels of access. • A gold lock appears in the address bar of IE when a user connects to a secure site (SSL). • In Windows 7, administrators must take measures to ensure the compatibility of their legacy applications.

  41. Skills Summary (cont.) • Application Compatibility Toolkit is for application incompatibilities that are not readily solvable with the Windows 7 compatibility mode settings. • Software restriction policies enable administrators to specify the programs that are allowed to run on workstations. • AppLocker enables administrators to create application restriction rules more easily.